forked from cybrespace/mastodon
56 lines
1.6 KiB
Ruby
56 lines
1.6 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
module Settings
|
|
module TwoFactorAuthentication
|
|
class ConfirmationsController < BaseController
|
|
include ChallengableConcern
|
|
|
|
layout 'admin'
|
|
|
|
before_action :authenticate_user!
|
|
before_action :require_challenge!
|
|
before_action :ensure_otp_secret
|
|
|
|
skip_before_action :require_functional!
|
|
|
|
def new
|
|
prepare_two_factor_form
|
|
end
|
|
|
|
def create
|
|
if current_user.validate_and_consume_otp!(confirmation_params[:otp_attempt])
|
|
flash.now[:notice] = I18n.t('two_factor_authentication.enabled_success')
|
|
|
|
current_user.otp_required_for_login = true
|
|
@recovery_codes = current_user.generate_otp_backup_codes!
|
|
current_user.save!
|
|
|
|
UserMailer.two_factor_enabled(current_user).deliver_later!
|
|
|
|
render 'settings/two_factor_authentication/recovery_codes/index'
|
|
else
|
|
flash.now[:alert] = I18n.t('two_factor_authentication.wrong_code')
|
|
prepare_two_factor_form
|
|
render :new
|
|
end
|
|
end
|
|
|
|
private
|
|
|
|
def confirmation_params
|
|
params.require(:form_two_factor_confirmation).permit(:otp_attempt)
|
|
end
|
|
|
|
def prepare_two_factor_form
|
|
@confirmation = Form::TwoFactorConfirmation.new
|
|
@provision_url = current_user.otp_provisioning_uri(current_user.email, issuer: Rails.configuration.x.local_domain)
|
|
@qrcode = RQRCode::QRCode.new(@provision_url)
|
|
end
|
|
|
|
def ensure_otp_secret
|
|
redirect_to settings_two_factor_authentication_path unless current_user.otp_secret
|
|
end
|
|
end
|
|
end
|
|
end
|